Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

Overview of Acceleration and Routing mode for WXA

03/26/2020 1,250 People found this article helpful 198,047 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    This article contains an overview of acceleration and routing mode for the WXA series.

    Resolution

    Feature/Application:

    This document gives a quick overview of TCP & USMB acceleration when the SonicWall appliance is configured in "Routed Mode".

    Note
    • There exists an issue when Web-Cache is enabled in Routed Mode. Click here to know more about the issue and its workaround.
    • Acceleration is not supported in dynamic/protocol routing.


    There exists an issue when Web-Cache is enabled in Routed Mode. Click here to know more about the issue and its workaround.
    : Acceleration is not supported in dynamic/protocol routing

    Figure 1 Test network example

    ImageAbove is the test network setup.



    Notes

    • Traffic is going from LAN to WAN so by default traffic will be applied NAT
    • If traffic has NAT applied then it will not be TCP Accelerated.
    Figure 2 NAT policies disabled on NSA3600
    Image

     

    Figure 3 NAT policies disabled on NSA250M
    Image

    SonicOS uses the routing table to enable acceleration on a route.

    Figure 4 NSA3600 routing table
    Image


    Route number 2 is the route with acceleration enabled.

    Traffic from the "X3 Subnet" to the "RemoteSubnet (172.16.0.0/24)" use "X1 Default Gateway". I use the address object name "RemoteSubnet" on the NSA3600 and on the NSA250M. However on the NSA3600 the address object "RemoteSubnet" is the X3 Subnet of the NSA250M. Inversely on the NSA250M the address object "RemoteSubnet" is the X3 Subnet of the NSA3600.

    You can use any address object name you wish.

    Figure 5 Route #2 on NSA3600
    Image

     

    Figure 6 NSA250M routing table
    Image

     

    Figure 7 NSA250M Route #1
    Image


    Same as the NSA3600, traffic from the "X3 Subnet" to the "RemoteSubnet (172.16.3.0/24)" use "X1 Default Gateway".

    How to debug

    Is traffic being forwarded to the WXA?

    Couple of ways to figure this out

    • Look at the TCP Accel or WFS "Statistics" tab are the traffic counts increasing. May have to wait up to 10 minutes depending on throughput rate.
    • You can look at "Connection Monitor" and find connections with "src iface" the same as the WXA dedicated interface.
    Figure 8 NSA250 X2 connection from WXA
    Image

     

    • You can also use "Packet Monitor" to capture traffic on the WXA interface.


    Traffic is not being forwarded?

    • Look at the logs for both WXA and NSA.
    • Look at the "Debug"" stats on the NSA "diag" page.
    Figure 9 The show debug stats displays connections forwarded to WXA
    Image



    Figure 10 Debug statistics
    Image

     

    Figure 11 Zero the statistics
    Image

    When you make a change you may wish to zero the statistics and then check again which counter is increasing.


    Web caching stops working in Route Mode due to Web Proxy NAT policy being lower than Routed Mode NAT policy.

    If an interface is to be configured to be Routed Mode, the default outbound NAT Policy must be disabled and a new "no-NAT" NAT Policy created. This can be done either manually or by enabling Express Mode Settings on the Advanced tab of the interface.


    Image
    When Express Mode Settings is enabled, the SonicWall auto-creates the No-NAT NAT Policy.


    Image
    When WXA Web Cache is enabled, three NAT policies are auto-created to divert traffic to the WXA appliance.

    ImageImage


    Image
    If Express Mode Settings is configured before enabling Web Cache, the auto-created no-NAT NAT Policy takes precedence over the Web Cache NAT policies thus rendering it ineffective.

    Image

    This prevents Route Mode subnet traffic from being cached by WXA.

    As a workaround, perform the following steps:

    1. Login to the SonicWall management GUI
    2. Navigate to the Interfaces page.
    3. Click on Configure on the interface in Routed Mode.
    4. Disable the check box under Express Mode Settings.
    5. Click on OK to save.

    This will delete the auto-created outbound no-NAT NAT policy.

    1. Click on Configure on the Routed Mode interface.
    2. Click on the Advanced tab.
    3. Enable check box under Express Mode Settings.
    4. Click on OK to save.

    This will re-create the outbound no-NAT NAT policy with a lower priority than the Web Cache NAT policy.

    Related Articles

    • Bandwidth usage and tracking in SonicWall
    • How to force an update of the Security Services Signatures from the Firewall GUI
    • Configure Guest VLAN in the TZ firewall, for guest users to access Internet only.

    Categories

    • Firewalls > WAN Acceleration

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2023 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top